Name | CVE-2025-59378 |
Description | In guix-daemon in GNU Guix before 1618ca7, a content-addressed-mirrors file can be written to create a setuid program that allows a regular user to gain the privileges of the build user that runs it (even after the build has ended). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1115303 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
guix (PTS) | bullseye | 1.2.0-4+deb11u2 | vulnerable |
bullseye (security) | 1.2.0-4+deb11u3 | vulnerable | |
sid | 1.4.0-9 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
guix | source | (unstable) | (unfixed) | 1115303 |
https://guix.gnu.org/en/blog/2025/privilege-escalation-vulnerability-2025-2/
https://codeberg.org/guix/guix/pulls/2419
Fixed by: https://codeberg.org/guix/guix/commit/2a333541e8f1907ae0bc80cf500a99567ca46d08
Fixed by: https://codeberg.org/guix/guix/commit/f607aaaaaafe19257ef09ca519d325df6ae97e05
Fixed by: https://codeberg.org/guix/guix/commit/9202921e812708b23788b2209cdb576d456f56db